Here’s how to wrangle your passwords without going crazy – By Sean Captain fastcompany.com
Marriott. Exactis. Under Armour. The list of online breaches marches on. You can’t prevent corporations from bungling security and leaking your data. But taking extra care with your logins can minimize the damage. Some best practices are obvious: For instance, you shouldn’t use the same username and password for multiple sites, lest hackers who break into one account can access others. And if you don’t store information–such as credit card numbers–in the first place, it can’t be breached.
Better password protections in Chrome – How it works – By security.googleblog.com
Don't Wait for Microsoft to Reset Your Account's Password – By lifehacker.com
Microsoft’s decision to reset the passwords of 44 million accounts, is actually a good thing. If your account is affected, thank Father Gates, because Microsoft is alerting you to the fact that it searched a database of more than three billion leaked accounts and found information belonging to yours.
What’s the Best Way to Back Up My Computer? – By Chris Hoffman howtogeek.com
Everyone loses data at some point in their lives. Your computer’s hard drive could fail tomorrow, ransomware could hold your files hostage, or a software bug could delete your important files. If you’re not regularly backing up your computer, you could lose those files forever.
What to Do Before (and After) Your Phone Is Stolen – By Andrew Heinzman howtogeek.com
Millions of phones are stolen every year, and there’s a chance yours could be one of them. But it doesn’t have to be—you can make your phone theftproof! We’ll show you how, and what you should do if your phone is stolen.
LastPass: Password security for your family in 2018 – By dottotech youtube.com Video
How to Use OneDrive’s “Personal Vault” to Secure Your Files – By Chris Hoffman howtogeek.com
Microsoft’s OneDrive cloud storage service now includes a “Personal Vault” for your sensitive files. These files are encrypted and protected with additional two-factor verification, even when they’re synced to your Windows 10 PC.
Wyze’s New Subscription Plan Keeps Your Video Going for $1.49 a Month – By Josh Hendrickson reviewgeek.com
Wyze, the company behind the best and cheapest Wi-Fi cameras on the market, is taking the wraps off its first subscription service today. For $1.49 a month, Wyze Cams gain continuous recording, as opposed to limited 12-second clips. You can also try the service for free for two weeks before committing—no credit card required.
The best password managers for 2019 and how to use them – By Clifford Colby cnet.com
No more struggling to come up with clever, cryptic passwords that you have a hard time remembering. With a secure and easy-to-use password manager, you can manage your login credentials across all your devices, keeping your passwords secure, automatically filling in forms, and syncing your data across MacOS, Windows, Android phones, iPads, iPhones and more.
Roboform Everywhere review: Solid password security – By Michael Ansaldo pcworld.comOne of the earliest password managers, Roboform Everywhere doesn’t quite have the cachet that its longevity would suggest. Despite its age, it lacks much of the polish and sophistication of products like LastPass and Keeper. But its relative simplicity makes it good option for newbies or user who want get a better handle on their passwords without too much complexity.
Why you should never reuse a password – By Mir Ubaid tomsguide.com4
Are you one of those people? You know, the ones who use the same password for almost every website? You've heard that's a bad idea, but you think you're secure, right?
Using a built-in FIDO authenticator on latest-generation Chromebooks – By security.googleblog.com
Before we dive deeper into this capability, let’s first cover the main use cases FIDO technology solves, and then explore how this new enhancement can satisfy an advanced requirement that can help enterprise organizations.
10 Easy Steps to Better iPhone and iPad Security – By Tim Brookes howtogeek.com
There’s a good chance you spend more time interacting with the online world on your smartphone than any other device. Let’s take a look at how you can up your iPhone and iPad security game.
Why You Should Ditch Google Authenticator for Authy (for Two-Factor Authentication) – By Khamosh Pathak guidingtech.com
Google is pushing two-factor authentication really hard. And that’s great news. The problem is that Google Authenticator for Android is an abomination (and I’m not even using hyperbole here). It’s still using Holo interface. That’s now 2 generations old. What hurts even more is the fact that Google Authenticator for iPhone was upgraded recently with Material Design.
Authy vs LastPass Authenticator: Which 2FA App Should You Use – By Gaurav Bidasaria guidingtech.com
As privacy concerns continue to rise, the use of two-factor authentication (2FA) apps is now a necessity. Apart from Google and Microsoft, a handful of players are offering their 2FA apps packed with new and innovative features. Authy and LastPass Authenticator are quickly rising the popularity charts among the 2FA apps.
You're Probably Doing 2FA Wrong: Here's the Right Way – By Paul Wagenseil Tom's Guide
The most common method for two-factor authentication is texted codes, but it's also the least secure.
Google, Facebook, Apple, Microsoft, Dropbox and many other online services offer two-factor authentication (2FA) as an option to protect your account.
With 2FA enabled, it's much harder for a crook to break into your account, even if he or she knows or can guess your password, because the crook will be missing that crucial second factor that only you possess. We at Tom's Guide urge our readers to enable 2FA whenever they can.
Why You Shouldn’t Use Your Web Browser’s Password Manager – By Chris Hoffman howtogeek.com
We recommend using a password manager like 1Password, LastPass, or Bitwarden. But modern web browsers have built-in password managers, so why install a different one? There are many good reasons to avoid your web browser’s built-in tool.
The Best Way to Tackle the LastPass Security Challenge – By Chris Hoffman howtogeek.com
If you use LastPass, you should take the Security Challenge. It will scan your vault for compromised, weak, reused, and old passwords and recommend passwords you should change. LastPass will give you a numerical security score, too.
Are free password managers safe to use? – By Ken Colburn datadoctors.com
Everyone has heard the advice that you need to use long, complex passwords that are unique to each account that you use. Unless you only have one or two online accounts, the only way to adhere to these security measures is to use some form of password manager.
Low-Hanging Fruit Series: Multi-factor Authentication (MFA) – By Austin Downing vdalabs.com
At VDA Labs we work with a variety of companies both large and small. During our engagements, we see many of the same reoccurring issues that allow us access to systems. To help combat these threats VDA Labs is starting a blog series we are calling “Low-Hanging Fruit”. Throughout this series VDA will be talking about the most common issues we see, along with how each issue can be combated. In our previous piece we talked about password security. This article discusses why organizations need Multi-Factor Authentication (MFA) and some foibles we see around MFA implementations.
How to Use Chrome’s Built-in Virus Scanner – By Neeraj Chand maketecheasier.com
Viruses and malware used to attack only desktops, but now it is very prevalent online, too. Surfing the web nowadays requires plenty of caution, as you never know if the next website you are visiting contains a virus.
Privacy.com Offers Virtual Payment Cards To Keep Your Digital Cash Secure – By Curtis Silver forbes.com
Technology, as cliche as this might sound, has come a long way. Yet, we still cling to paper and plastic as payment methods. Plastic being the dominant one these days. Chip readers, card swipers and constantly typing our debit card number into online forms puts us and our meager finances at continuous risk. Similar to how we protect ourselves online through VPN services, Privacy.com offers virtual payment cards that act like a VPN when it scrambles your IP address, shielding your true account information from possible scammers.
Money at 30: Privacy.com Review — How it Could Help Keep Your Money Safe – By Kyle Burbank dyernews.com
First the bad news: considering all the major data breaches that have hit retailers, websites, and freaking credit bureaus alike, there’s a very strong chance your personal info has been compromised at some point. Luckily, in addition to steps you can take such as freezing your credit reports to prevent criminals from using this data, there are a growing number of tools you can use to foil thieves in the future. Add to this list Privacy.com, which allows users to create unique card numbers they can use to conceal their actual info.
The difference between Encryption, Hashing and Salting – By Patrick Nohe thesslstore.com
Encryption and Hashing both serve different functions despite their similarities
Quick, do you know the difference between encryption and hashing? Do you know what salting is? Do you think salting your hash is just part of an Irish breakfast?
How Safe Are Password Managers? – By Chris Hoffmanhowtogeek.com
A password manager stores all your passwords and automatically fills them in your web browser and mobile apps. But is trusting an app with your passwords and storing them all in one place a smart idea?
What's the Password? – By Constance Gibbs timeforkids.com
In an ancient folktale, a giant rock blocks the entrance to a cave filled with treasure. A door appears only for those who speak a secret phrase aloud: “Open, sesame!” This is an early example of a password.
Enable 2FA for your favorite sites.
Go beyond the password and protect yourself from hackers and account takeovers. 2-factor authentication (2FA) is the best way to protect yourself online. Defeat cyber criminals & avoid account takeovers with stronger security, for free! Watch the video below to learn more about why you should enable 2FA for your accounts.
The Best Two-Factor Authentication App – thewirecutter.com
The most important thing you can do to increase your online security, alongside using a password manager, is to enable two-factor authentication. After interviewing three experts and testing seven authenticator apps, we think Authy has the best combination of compatibility, usability, security, and reliability.
Getting started with security keys – By Bruce Schneier paulstamatiou.com
Every week I come across another headline about how someone got hacked and within moments many of their online accounts had become compromised. These aren't simple cases of bad actors using account credentials from large public data breaches and the unfortunate result of people using the same password across many websites.
Put a stop to robocalls for good – By Jason Cipriani cnet.com
I think it's safe to say we've all received a call that starts with "Hello, can you hear me?" Or how about "Congratulations! You've won a free trip to the Bahamas!" the moment you say hello. It's somewhat exciting, if not confusing the first time it happens. But when you realize it's a robocall and, ultimately, a scam, that's when frustration sets in.
Stop Unwanted Robocalls and Texts – By fcc.gov
Robocalls are calls made with an autodialer or that contain a message made with a prerecorded or artificial voice.
Advances in technology have unfortunately allowed illegal and spoofed robocalls to be made from anywhere in the world and more cheaply and easily than ever before. That's why it's become more of a problem for consumers, and a more difficult problem to solve.
Old Wi-Fi Routers Aren’t Just Slow, They’re Insecure: It’s Time to Upgrade – By Jason Fitzpatrick lifesavvy.com
For most people, their wireless router is just some dusty box they never think about unless it’s not working. But old routers aren’t just slower; they’re often insecure. Here’s how to fix that.
I Completely Solved the Wi-Fi Issues in My House By Adding These New Products From Google – By John Brandon thedailybeast.com
“What the heck is wrong with the wireless?” This is a question that comes up often in my house. My usual response: No idea. The gremlins and fairies that carry my Internet data back and forth between the iPad in my hands, my phone, a connected garage door opener, a connected doorbell, the security cameras, and 17 million other gadgets in my house are taking a break I guess. They’re tired. I’m not actually sure how any of this works, and if you start talking to me about wireless network specifications I will hit myself in the head with a frying pan.
LastPass Security Features You Should Be Using – By Amber Steel blog.lastpass.com
Ready to take your security to the next level? In our first post for Cyber Security Awareness Month, we discussed how to set up LastPass to protect your digital profile. Now that you’re more familiar with some of the basic components of LastPass and how it can help protect you, let’s dive into the features and settings that will boost the security of your LastPass vault and help you better secure your digital profile.
New research reveals top 5 most secure Password Managers – By tweaktown.com
What sort of passwords do you use? Things like '123456', 'qwerty' or even 'password'? If so, you are not alone, but you should be worried. These are among the most commonly used passwords around and all leave users accounts inherently vulnerable.
How to use Google Chrome’s password manager – By Michael Allison mspoweruser.com
Saving your passwords in your head may be an old fashioned way of doing things, but it is quite impractical. You may forget, misremember, or even end up duplicating passwords (inadvisable). Saving it in a notebook, either physical or digital is just asking to be hacked. Common wisdom suggests users make use of a password manager, and Google’s Chrome has that built-in.
No One Knows About Two-Factor Authentication and Private Browsing – By lifehacker.com
Sounds strange, doesn’t it? As much as we try to promote the importance of this security measure—a secondary means of identifying that whoever is trying to log into your account is actually you—a recent survey from the Pew Research Center indicates that more than half of those quizzed cannot identify a single example of two-factor authentication.
Five myths about password managers – By blog.mozilla.org
Password managers are the most recommended tool by security experts to protect your online credentials from hackers. But many people are still hesitant to use them. Here’s why password managers are safe, secure and your best defense against password-hungry cyber criminals.
7 Cybersecurity Threats That Can Sneak Up on You – By David Nield wired.com
There's a certain kind of security threat that catches the headlines—the massive data breach, or the malware that hijacks your computer for a ransom—but it's also important to keep your guard up against some of the lesser-known attacks out there too.
Google's Password Checkup feature now comes built into Chrome – By Georgina Torbet engadget.com
It's hard for anyone to stay on top of the seemingly endless string of data breaches. To help users with this challenge, Google created a tool for its Chrome browser which automatically checks whether passwords have been compromised.
Explained: Two-Factor vs. Multi-Factor Authentication – By Yaser Masoudnia securityledger.com
Everyone knows that passwords alone aren’t enough. Weak, reused or old passwords cause 80 percent of data breaches. From phishing to ransomware, zero-day vulnerabilities, to man-in-the-middle attacks, to key-logging and password cracking, cyberattacks leverage faster tools and exploit known weaknesses to get around even the strongest of passwords. Every application, device and login is an entryway to your business. They need to be better protected.
Why You Should Sign In With Google, Facebook, or Apple – By Chris Hoffman howtogeek.com
Are you still creating user accounts everywhere? Maybe you should stop and sign in with your Google, Facebook, or Apple account instead. It might just be more secure—and it’s definitely more secure if you’re not currently using a password manager.
Is It Safe To Unsubscribe From Spam Emails? Be Careful What You Click – By Sarah Friedmann bustle.com
The "unsubscribe" button seems like a pretty surefire way to stop unwanted emails from clogging up your inbox. However, clicking this seemingly innocuous button could come with a risk. Surprisingly, it actually isn't safe to unsubscribe from spam emails this way — in fact, some scammers rely on your click to access even more of your information.
How to Protect Your Identity Online – By Dave Johnson howtogeek.com
When Sandra Bullock starred in The Net in 1995, identity theft seemed new and unbelievable. But the world has changed. Starting in 2017, nearly 17 million Americans are victims of identity fraud every year.
Why you can stop paying for antivirus software – By Mark Hachman pcworld.com
You don't need to pay for antivirus software anymore. Microsoft’s Windows Defender, a free service that’s built right into Windows 10, is now as good as the paid antivirus/antimalware solutions that have been collecting your money for years. There, we said it.
Private Browsing Won't Protect You From Everything – By Ben Dickson pcmag.com
In the past several years, most internet browsers have added a private browsing mode aimed at protecting user privacy. Chrome calls it Incognito Mode; it's Private Browsing in Opera, Safari, and Firefox.
Former hacker warns against password reuse By Danny Bradbury nakedsecurity.sophos.com
Kyle Milliken is back from jail, and he has some advice for you.
The 30-year-old hacker from Arkansas, according to his blog, at age 17 began phishing celebrity Myspace accounts and using them to send internet marketing spam. After earning $5,000 per week, he evolved to hack millions of email, forum, and social media accounts. Some of his largest thefts included Disqus (17.5 million), Kickstarter (5.2 million) and Imgur (1.7 million). He also claims to have hit Twitter and Pinterest among many others.
Chrome Devises Auto Update policy by support.google.com
Chrome devices receive automatic updates regularly that enhance both the device itself and the software on the device. Chrome device updates are designed to be simple for the user and, therefore, include updates to the device, Chrome operating system, browser, and firmware.
How To Use A Password Manager – By Tyler Leeubergizmo.com
Using the same password for all your online accounts is probably the worst idea ever. This is because in the event your password is leaked, hackers will be able to access all your online accounts and services.
Best password managers: Reviews of the top products – By Michael Ansaldopcworld.com
We are terrible at passwords. We suck at creating them (the top two most popular remain “123456” and “password”), we share them way too freely, and we forget them all the time. Indeed, the very thing that can ensure our online security has become our biggest obstacle to it. This is what makes a good password manager essential.
2fa explained: How to enable it and how it works – By JR Raphaelcsoonline.com
Two-factor authentication (2fa) is a method of establishing access to an online account or computer system that requires the user to provide two different types of information.
Almost All Web Encryption Works Like This (SP Networks) – Computerphile – By Computerphileyoutube.com Video
Substitution-permutation networks are the basis for almost all modern symmetric cryptography. Dr Mike Pound explains.
What Should You Do If You Receive a Phishing Email? – By Rob Woodgatehowtogeek.com
If you receive a phishing email, it can be a bit scary. Fortunately, nothing infects your computer if you don’t click any links or respond. Here’s what to do (and what not to do) if you receive a phishing email.
Fraud Alert: Genetic Testing Scam by U.S. Department of Health and Human Services Office of Inspector General
The U.S. Department of Health and Human Services Office of Inspector General is alerting the public about a fraud scheme involving genetic testing. Genetic testing fraud occurs when Medicare is billed for a test or screening that was not medically necessary and/or was not ordered by a Medicare beneficiary's treating physician.
What is Google Smart Lock, Exactly? – By Cameron Summersonhowtogeek.com
Google does this thing where it uses bad names for products. Then it re-uses those names for other products, confusing everyone. Such is the case for Smart Lock, which is technically three different things, depending on whether you’re talking about Android, Chromebooks, or passwords.
Use Smart Lock to Automatically Unlock Your Chromebook With Your Android Phone – By Emailhowtogeek.com
The “Smart Lock” feature on Chrome OS allows you to pair your Chromebook with your Android phone, automatically unlocking it when the phone is nearby and unlocked.
Why Do You Have to Log In to Your Home PC, Anyway? – By Chris Hoffmanhowtogeek.com
Every time you turn on your computer, you have to choose a user account and sign in. That’s true on Windows, macOS, Linux, and even Chrome OS. Here’s why this is necessary for PCs but not iPhones, iPads, and Android.
Spam In your Calendar? Here’s What to Do. – By krebsonsecurity.com
Many spam trends are cyclical: Spammers tend to switch tactics when one method of hijacking your time and attention stops working. But periodically they circle back to old tricks, and few spam trends are as perennial as calendar spam, in which invitations to click on dodgy links show up unbidden in your digital calendar application from Apple, Google and Microsoft. Here’s a brief primer on what you can do about it.
Google Has a Fix to Stop Google Calendar Spam – By Kris Woukmakeuseof.com
Google is working on a fix to stop Google Calendar spam. Which is hitting more and more people every week. And while Google’s permanent fix isn’t ready yet, there is a way to stop Google Calendar spam right now by tweaking a few settings.
Google says it’s working to remove annoying spam from Calendar – By Manuel Vonauandroidpolice.com
In June, we discovered that spammers and scammers found a new way to distribute their unwarranted information via Google Calendar by exploiting a default setting in Gmail which automatically invites email recipients to events. Now, Google is finally ready to step in. The company today announced that it's working on resolving the issue, but isn't ready to share any details just yet.
Experts share their (mostly) hassle-free security tips – By Roberto Baldwinengadget.com
It seems like every day another big corporation discloses a breach. Equifax, Capital One, Marriot, and a whole host of other companies have leaked the personal data of millions of their customers. That pilfered information could be used to steal identities or hack into other accounts. This sobering reality is a reminder that more than ever, we should secure our accounts and take control of our data. You probably can't stop hackers from breaking into a hotel chain, but you can put up roadblocks to stop them from infiltrating your life.
Microsoft Says Password Strength Doesn't Matter: Here's Why It Does – By Paul Wagenseiltomsguide.com
Some password managers are not as effective as others.
Your password strength doesn't matter, says a Microsoft security expert. Not the length, not the complexity, not how many special characters it uses. Hackers can get it anyway, and the only thing that truly makes a difference, he says, is whether you have two-factor authentication (2FA) turned on.
How to Stop Spammers From Attacking Your Google Calendar – By Justin Duinohowtogeek.com
Spammers have found a way to add unwanted phishing and scam events to people’s Google Calendars without their permission. Here’s how to stop spammers from adding things to your calendar without your permission.
How to enable Ransomware Protection in Windows Defender and add custom folders to it – By Ashwinghacks.net
Windows Defender has been gaining a foothold steadily for the past few years. But there is one flaw in the antivirus that ships with Windows 10.
Everybody Should 2FA – By Authy youtube.com Video
Learn more about two-factor authentication and download the Authy app for IOS, Android and Chrome.
How to do two-factor authentication like a pro – By Sandra Gutierrez G
You can hold the key to your online security. Like, literally.
If your level of anxiety over online security and privacy is on the healthy side, you probably already have two-factor authentication (2FA) set up for your main accounts. If you don't, you should seriously consider activating it to protect yourself from phishing, hacks, and anybody who may want to steal your data.
What to Do Before (and After) Your Phone Is Stolen – By Andrew Heinzmanhowtogeek.com
Millions of phones are stolen every year, and there’s a chance yours could be one of them. But it doesn’t have to be—you can make your phone theftproof! We’ll show you how, and what you should do if your phone is stolen.